WILL INTERNET USE BE MONITORED AND FILTERED AT SCHOOL Sample Clauses

WILL INTERNET USE BE MONITORED AND FILTERED AT SCHOOL. All student internet use is filtered and monitored whilst connected to the school’s wireless internet. Our filtering and monitoring software also will alert us to any behaviour that may put the student at risk. Parents should, however, be aware that if they supply their child with a device with 3G/4G connectivity (such as a smart phone), students will be able to access the internet via this device and we will be unable to monitor this use.
AutoNDA by SimpleDocs

Related to WILL INTERNET USE BE MONITORED AND FILTERED AT SCHOOL

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.

  • Customer Feedback The contractor is expected to establish and maintain professional communication between its employees and customers. The primary objective of this communication is customer satisfaction. Customer satisfaction is the most significant external indicator of the success and effectiveness of all services provided and can be measured through customer complaints and surveys. Performance management drives the contractor to be customer focused through initially and internally addressing customer complaints and investigating the issues and/or problems but the customer always has the option to communicate complaints to the PM, as opposed to the contractor. Customer feedback may also be obtained either from the results of formal customer satisfaction surveys or from random customer complaints. Any customer complaints will be investigated by the PM using the Quality Assurance Monitoring Form – Customer Complaint Investigation, identified in Attachment A4.

  • Xxxxxxx INTERNET Xxxxxx.Xxxxxxx@xxx.xxx TELEPHONE: (000) 000-0000 FAX: (000) 000-0000 /RA Xxxxxx Xxxxx for/ Xxxxx X. XxXxxxxxx, Director Division of Materials Safety and State Agreements Office of Federal and State Materials and Environmental Management Programs Enclosures:

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Software Casos de Uso Red Hat Enterprise Linux Desktop Red Hat Enterprise Linux Workstation Sistemas de computadoras personales con el fin principal de ejecutar aplicaciones y/o servicios para un usuario único que por lo general trabaja con una conexión directa al teclado y la pantalla. Nota: La implantación de autorizaciones asociadas de sistema Red Hat Network o Módulos de Gestión Inteligente en un sistema que no sea Red Hat Enterprise Linux Desktop o Workstation no es un Caso de Uso soportado.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to PCS for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers.

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

Time is Money Join Law Insider Premium to draft better contracts faster.